Lead2pass is constantly updating 400-101 exam dumps. We will provide our customers with the latest and the most accurate exam questions and answers that cover a comprehensive knowledge point, which will help you easily prepare for 400-101 exam and successfully pass your exam. You just need to spend 20-30 hours on studying the exam dumps.

QUESTION 341Refer to the exhibit. Routers A and B are the edge devices at two different sites such as shown. The two edge devices use public addresses on their WAN interfaces and the both sites use RFC 1918 for all other addresses. If routers A and B have established an IPsec tunnel, which statement about the network environment must be true?

A. Router A1 and router B1 are using NAT translation to allow private-address traffic to traverse the tunnelB. Router A and router B are using BGP to share routes between the two sitesC. The tunnel terminates on the ISP routesD. Each site is capable of routing private addressing over the IPsec tunnel

Answer: D

QUESTION 342Which STP feature can protect the network environment from loops in case of software failure?

QUESTION 343Refer to the exhibit. Routers A and B are the edge devices at two different sites as shown. If routers A and B have established an IPsec tunnel, which two statements about the network environment must be true? (Choose two)

A. The connection could have been authenticated with 802.1xB. The connection could have authenticated with a pre-shared keyC. RFC 1918 addresses are in use on the WAN interfaces on router A and router BD. The connection could have been authenticated with MD5E. Public IP addresses are in use on the WAN interfaces on router A and router B

Answer: BE

QUESTION 344Refer to the exhibit, multiple hosts on the 10.2.2.0/24 network are sending traffic to the web server, Which configuration can you apply to R2 so that traffic from host 1 uses the path R2-R1-R3 to reach the web server, without affecting other hosts?

QUESTION 345A floating static route pointing to an interface appears in the routing table even when the interface is down. Which action can you take to correct the problem?

A. Correct the DHCP-provided route on the DHCP serverB. Remove the permanent option form the static routeC. Correct the administrative distanceD. Configure the floating static route to point to another route in the routing table

Answer: B

QUESTION 346When multiple AAA authentication methods are specified in a method list and all working normally, how is the user authenticated?

A. The user is authenticated against all provided authentication sources and granted the most restricted set of access privilegesB. The user is authenticated against the first listed authentication source onlyC. The user is authenticated against the provided authentication sources in order until a match is foundD. The user is authenticated against all provided authentication sources and granted the least restricted set of access privileges

Answer: B

QUESTION 347Which feature must be enabled prior to enabling the IGMP Snooping Querier?

A. PIM-SMB. SSMC. IP helperD. IGMP Snooping

Answer: D

QUESTION 348Which protocol enables routers in an MPLS environment to use labels to move traffic?

A. FTPB. POPC. LLDPD. PPPE. L2TPF. LDP

Answer: F

QUESTION 349Which PIM feature allows the same multicast group address to be reused in different administrative domains?

QUESTION 353Refer to the exhibit. Which device role could have generated this debug output?

A. an NHS onlyB. an NHC onlyC. an NHS or an NHCD. a DMVPN hub router

Answer: B

QUESTION 354Which statement about the NHRP network ID is true?

A. It is sent from the spoke to the hub to identify the spoke as a member of the same NHRP domain.B. It is sent from the hub to the spoke to identify the hub as a member of the same NHRP domain.C. It is sent between spokes to identify the spokes as members of the same NHRP domain.D. It is a locally significant ID used to define the NHRP domain for an interface.

Answer: D

QUESTION 355You are configuring a DMVPN spoke to use IPsec over a physical interface that is located within a VRF. For which three configuration sections must you specify the VRF name? (Choose three.)

A. the ISAKMP profileB. the crypto keyringC. the IPsec profileD. the IPsec transform setE. the tunnel interfaceF. the physical interface

Answer: BEF

QUESTION 356Which IPv6 prefix is used for 6to4 tunnel addresses?

A. 2001. . /23B. 2002. . /16C. 3ffe. . /16D. 5f00. . /8E. 2001. . /32

Answer: B

QUESTION 357When you configure the ip pmtu command under an L2TPv3 pseudowire class, which two things can happen when a packet exceeds the L2TP path MTU? (Choose two.)

A. The router drops the packet.B. The router always fragments the packet after L2TP/IP encapsulation.C. The router drops the packet and sends an ICMP unreachable message back to the sender only if the DF bit is set to 1.D. The router always fragments the packet before L2TP/IP encapsulation.E. The router fragments the packet after L2TP/IP encapsulation only if the DF bit is set to 0.F. The router fragments the packet before L2TP/IP encapsulation only if the DF bit is set to 0.

A. the tunneling protocolB. the transport protocolC. the ISAKMP profileD. the transform-setE. the tunnel peer

Answer: AB

QUESTION 359By default, how does a GET VPN group member router handle traffic when it is unable to register to a key server?

A. All traffic is queued until registration is successful or the queue is full.B. All traffic is forwarded through the router unencrypted.C. All traffic is forwarded through the router encrypted.D. All traffic through the router is dropped.

Answer: B

QUESTION 360Which two protocols are not protected in an edge router by using control plane policing? (Choose two.)